نتایج جستجو برای: n threshold policy

تعداد نتایج: 1334510  

‎In a (t,n)-threshold secret sharing scheme‎, ‎a secret s is distributed among n participants such that any group of t or more participants can reconstruct the secret together‎, ‎but no group of fewer than t participants can do‎. In this paper, we propose a verifiable (t,n)-threshold multi-secret sharing scheme based on Shao and Cao‎, ‎and the intractability of the elliptic curve discrete logar...

Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...

Journal: :Operations Research 2010
Bernd Heidergott Taoying Farenhorst-Yuan

We consider multicomponent maintenance systems with an F -failure group age-replacement policy: it keeps failed components idling until F components are failed and then replaces all failed components together with the nonfailed components whose age has passed the critical threshold age n for components of type n. With each maintenance action, costs are associated. We derive various unbiased gra...

Alireza Salmani-Qahyazi, Fatemeh Mokhtari, Jalil Modaresi, Mohammad Afkhami-Ardekani, Mohammad Hosein Amirzade-Iranaq,

Objective: Diabetic patients suffer from different types of complications associated with peripheral nerves. A clear manifestation of these complications is found in the mouth where neuropathies commonly occur. The measurement of electrical stimulation threshold of teeth signifies premature involvement of peripheral nerves in the teeth. The aim of present study is to compare pulp tester respons...

Journal: :Information Systems Research 2004
I. Robert Chiang Vijay S. Mookerjee

T paper presents a project management policy in which the appearance of software faults during system construction is used to determine the timing of system integration activities (e.g., team meetings, analyzing modules for interface inconsistencies, system fault correction, and so on). System integration is performed only if a threshold fault count has been exceeded; otherwise, module developm...

Journal: :International journal of technology assessment in health care 2011
Irina Cleemput Mattias Neyt Nancy Thiry Chris De Laet Mark Leys

BACKGROUND In many countries, the incremental cost-effectiveness ratio (ICER) is used to assess whether an intervention is worth its costs. At the same time, policy makers often feel uncomfortable with refusing reimbursement of any intervention purely on the basis of the fact that the ICER exceeds a specific threshold value. Reluctance to define a single threshold value for the ICER seems to ha...

Journal: :Manufacturing & Service Operations Management 2015
Fernando Bernstein A. Gürhan Kök Lei Xie

We consider a retailer with limited inventories of identically priced, substitutable products. Customers arrive sequentially and the firm decides which subset of products to offer to each arriving customer depending on the customer’s preferences, the inventory levels, and the remaining time in the season. We show that the optimal assortment policy is to offer all available products if the custo...

Journal: :IEEE Journal on Selected Areas in Communications 2021

We present a comprehensive steady-state analysis of threshold-ALOHA, distributed age-aware modification slotted ALOHA proposed in recent literature. In each terminal suspends its transmissions until the Age Information (AoI) status update flow it is sending reaches certain threshold ?. Once age exceeds ?, attempts transmission with constant probability ? slot, as standard ALOHA. analyze time-av...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید